-
漏洞信息

-
漏洞描述

Ethereal contains a flaw that may allow a remote denial of service. The issue can be triggered when the SPNEGO dissector is used and an invalid ASN.1 value is parsed, and will result in loss of availability for the service.

-
时间线

公开日期:
2003-06-11

发现日期:
Unknow

利用日期:Unknow

解决日期:Unknow

-
解决方案

Upgrade to version 0.9.13 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): disable the SPNEGO protocol dissector by selecting Analyze->Enabled Protocols... and deselecting the SPNEGO-KRB5 protocol from the list

-
不受影响的程序版本

-
漏洞讨论

The SPNEGO dissector of Ethereal, when parsing certain ASN.1 codes, may cause a segmentation fault.

The precise technical details of this vulnerability are currently unknown. This BID will be updated as further information is available.

Due to the nature of this vulnerability, it may be possible for an attacker to create a situation in which sensitive memory could be overwritten.

-
漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

-
解决方案

SCO have released an advisory (CSSA-2003-030.0) and fixes to address this issue. Affected users are advised to install the appropriate fix as soon as possible. Further information regarding the application of these fixes can be found in the referenced advisory. Fixes are linked below.

Conectiva has released a security advisory (CLSA-2003:719) and fixes to address this issue. Users are advised to upgrade as soon as possible.

Red Hat has released a security advisory (RHSA-2003:077-13) containing fixes which address this and other issues with ethereal. See referenced advisory for further details on obtaining and applying fixes.

Conectiva has released a security advisory (CLA-2003:662) and fixes to address this issue. Users are advised to upgrade as soon as possible.

Ethereal 0.9.13 is not vulnerable to this issue. Affected users are advised to upgrade to the newest version of Ethereal.

Red Hat has released upgraded RPMs which correct this vulnerability. Please see advisory RHSA-2003:203-01 (references section) for download links.

Updates are available for Yellow Dog Linux. These updates can be applied manually or by issuing the following command: